Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20718: CWE-121 Stack Overflow in MediaTek, Inc. MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986

0
High
VulnerabilityCVE-2025-20718cvecve-2025-20718cwe-121
Published: Tue Oct 14 2025 (10/14/2025, 09:11:37 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986

Description

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00419945; Issue ID: MSV-3581.

AI-Powered Analysis

AILast updated: 10/14/2025, 09:39:38 UTC

Technical Analysis

CVE-2025-20718 is a stack overflow vulnerability classified under CWE-121, found in the WLAN Access Point (AP) driver of multiple MediaTek chipsets (MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986). The root cause is an incorrect bounds check that allows an out-of-bounds write on the stack, which can corrupt memory and lead to escalation of privileges. The vulnerability requires the attacker to have local user execution privileges but does not require any user interaction, making it easier to exploit once local access is obtained. The affected software versions include MediaTek SDK release 7.6.7.2 and earlier, and openWRT versions 19.07 and 21.02, which are commonly used in embedded devices and routers. Although no public exploits have been reported, the vulnerability poses a significant risk because it can allow an attacker to gain elevated privileges, potentially leading to full system compromise. The flaw impacts confidentiality and integrity by enabling unauthorized code execution and modification of system memory. The vulnerability was reserved in November 2024 and published in October 2025, but no CVSS score has been assigned yet. Due to the nature of the vulnerability and the affected components, it is critical for device manufacturers and users to apply patches or firmware updates once available. The vulnerability is particularly relevant for embedded systems and networking devices that rely on MediaTek chipsets, which are widely used globally, including in Europe.

Potential Impact

For European organizations, this vulnerability could have serious consequences, especially for those relying on networking equipment or embedded devices powered by the affected MediaTek chipsets. Successful exploitation could allow attackers with local access to escalate privileges, potentially gaining control over critical network infrastructure components such as wireless access points and routers. This could lead to unauthorized access to sensitive data, disruption of network services, and further lateral movement within organizational networks. The impact on confidentiality and integrity is high, as attackers could manipulate device firmware or intercept network traffic. Availability could also be affected if the device becomes unstable or is taken offline due to exploitation. Given the widespread use of openWRT in custom and commercial routers, organizations using these platforms are at increased risk. The lack of user interaction requirement lowers the barrier for exploitation once local access is achieved, increasing the threat level. European sectors with critical infrastructure, telecommunications, and enterprises with extensive wireless deployments are particularly vulnerable.

Mitigation Recommendations

1. Apply patches or firmware updates from MediaTek or device vendors as soon as they become available to address the vulnerability. 2. For organizations using openWRT, upgrade to versions beyond 21.02 that include the fix or apply vendor-provided patches. 3. Restrict local user access to devices running affected chipsets to trusted personnel only, minimizing the risk of local exploitation. 4. Implement strict network segmentation and access controls to limit the ability of attackers to gain local access to vulnerable devices. 5. Monitor device logs and network traffic for unusual activity that could indicate exploitation attempts or privilege escalation. 6. Employ endpoint detection and response (EDR) tools capable of detecting memory corruption or privilege escalation behaviors. 7. Conduct regular security audits and vulnerability assessments on embedded devices and network infrastructure to identify and remediate outdated firmware. 8. Educate IT staff about the risks associated with local privilege escalation vulnerabilities and the importance of timely patching.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.389Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ee16317eab8b438c025d41

Added to database: 10/14/2025, 9:21:53 AM

Last enriched: 10/14/2025, 9:39:38 AM

Last updated: 10/16/2025, 12:01:28 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats